Rapid7 Vulnerability & Exploit Database

RHSA-2016:0175: glibc security and bug fix update

RHSA-2016:0175: glibc security and bug fix update

Severity

7

CVSS

(AV:N/AC:M/Au:N/C:P/I:P/A:P)

Published

02/16/2016

Created

07/25/2018

Added

02/17/2016

Modified

10/30/2017

Description

The glibc packages provide the standard C libraries (libc), POSIX threadlibraries (libpthread), standard math libraries (libm), and the NameServer Caching Daemon (nscd) used by multiple programs on the system.Without these libraries, the Linux system cannot function correctly.A stack-based buffer overflow was found in the way the libresolv libraryperformed dual A/AAAA DNS queries. A remote attacker could create aspecially crafted DNS response which could cause libresolv to crash or,potentially, execute code with the permissions of the user running thelibrary. Note: this issue is only exposed when libresolv is called from thenss_dns NSS service module. (CVE-2015-7547)This issue was discovered by the Google Security Team and Red Hat.This update also fixes the following bugs:All glibc users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues.

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.